Course Title | Cybersecurity and data protection |
Course Code | M-225-04 |
Level | Master |
ECTS Credits | 6.00 |
Faculty/unit | Engineering Faculty |
Field | Computer and information sciences |
Course Type | Standard |
Course Leader | Revzina Elena - Mg. sc. comp. lecturer |
Annotation | Cybersecurity is a critically important field for business in every industry, especially given the proliferation of data breaches (more than 3.2 million records were compromised in the 10 biggest data breaches in the first half of 2020 alone). This course introduces the concept of cyber security and data protection, its interdisciplinary nature and its relation to nation, businesses, society and people. Participating students would gain knowledge of various principles of cybersecurity and data protection, as well as related technologies, tools, legal regulations and standards. |
Aim | Obtain an understanding of the role and principles of cybersecurity and data protection, as well as related technologies, tools, legal regulations and standards. |
LO1 | Identify traits of cybercriminals and security experts, core data protection principles, cybercriminal methods, infosec policies and standards, and data protection laws. |
LO2 | Usage of relevant technologies, products and procedures to protect data confidentiality; ensure data integrity and provide data high availability. |
LO3 | Application of standards and frameworks associated with data protection and cybersecurity. |
Required Literature | - Brooks, Charles J., et al. Cybersecurity Essentials, John Wiley & Sons, Incorporated, 2018. ProQuest Ebook Central, https://ebookcentral.proquest.com/lib/tsilv/detail.action?docID=5507961.
- Tanner, Nadean H.. Cybersecurity Blue Team Toolkit, John Wiley & Sons, Incorporated, 2019. ProQuest Ebook Central, https://ebookcentral.proquest.com/lib/tsilv/detail.action?docID=5747366.
- Watkins S., Calder A. Information Security Risk Management for ISO 27001/ISO 27002. IT Governance Publishing, 2019.
- Cisco Networking Academy On-line Materials. Cybersecurity Essentials ver.1.11.
- Kim D., Solomon M.G. Fundamentals of Information Systems Security, 3rd Edition. Jones & Bartlett Learning, 2016.
- Petrocelli, Thomas D. Data protection and information lifecycle management. Pearson Education, Inc, 2006.
- IT Governance Privacy Team. EU General Data Protection Regulation (GDPR) – An implementation and compliance guide, fourth edition. IT Governance Publishing, 2020.
- Phelps D.C., Gathegi J.N., Workman M. Information Security for Managers. Jones & Bartlett Learning, 2012.
|
Assessment Method | The module consists of 2 assessments:
Examination for 2 hours. The examination will contain theoretical questions and practical tasks.
Portfolio (practical assignment) During module students should develop and complete individual works. The practical classes are adopted from CISCO Networking Academy, from the course dedicated to the cybersecurity. All items are subject of individual completion.
The resit will be similar to the main sit. |
Independent study | The independent study is organised around reading/watching additional materials, which the academic staff will provide and publish. Additionally, practical task execution will involve preparation reports, which should be completed outside the campus. |
Full-time |
---|
First Sit Elements | Element Weighting, % | Group Work | Links to Results |
---|
Reports | 50 | | LO2, LO3 | Presentations | 50 | | LO1 |
|